Print Control Apparatus, Print Apparatus, Print Control Method, Computer-readable Medium And Computer-data Signal

AOKI; Yuka ;   et al.

Patent Application Summary

U.S. patent application number 12/204880 was filed with the patent office on 2009-07-30 for print control apparatus, print apparatus, print control method, computer-readable medium and computer-data signal. This patent application is currently assigned to FUJI XEROX CO., LTD.. Invention is credited to Yuka AOKI, Hajime ICHIDA, Yukio IIJIMA, Noriyuki KAJITANI, Shintaro KOJO, Takahiro SAITO.

Application Number20090190145 12/204880
Document ID /
Family ID40403885
Filed Date2009-07-30

United States Patent Application 20090190145
Kind Code A1
AOKI; Yuka ;   et al. July 30, 2009

PRINT CONTROL APPARATUS, PRINT APPARATUS, PRINT CONTROL METHOD, COMPUTER-READABLE MEDIUM AND COMPUTER-DATA SIGNAL

Abstract

A print control apparatus includes a print request receiving unit and a print control unit. The print request receiving unit receives a print request, including print target information, to a print apparatus. If a condition is satisfied under which print target information should have information regarding security added thereto for printing, the print control unit adds the information regarding security to the print target information and causes the print apparatus to print the print target information to which the information regarding security is added. If the condition is not satisfied, the print control apparatus stores the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, the print control apparatus causes the print apparatus to print the stored print target information.


Inventors: AOKI; Yuka; (Tokyo, JP) ; SAITO; Takahiro; (Kawasaki-shi, JP) ; KOJO; Shintaro; (Kawasaki-shi, JP) ; IIJIMA; Yukio; (Kawasaki-shi, JP) ; ICHIDA; Hajime; (Kawasaki-shi, JP) ; KAJITANI; Noriyuki; (Kawasaki-shi, JP)
Correspondence Address:
    SUGHRUE-265550
    2100 PENNSYLVANIA AVE. NW
    WASHINGTON
    DC
    20037-3213
    US
Assignee: FUJI XEROX CO., LTD.
Tokyo
JP

Family ID: 40403885
Appl. No.: 12/204880
Filed: September 5, 2008

Current U.S. Class: 358/1.9
Current CPC Class: H04N 1/00838 20130101; G06F 3/1297 20130101; H04N 1/32144 20130101
Class at Publication: 358/1.9
International Class: G06F 15/00 20060101 G06F015/00

Foreign Application Data

Date Code Application Number
Jan 24, 2008 JP 2008-013507

Claims



1. A print control apparatus comprising: a print request receiving unit that receives a print request to a print apparatus, the print request including print target information; and a print control unit, wherein if a condition is satisfied under which print target information should have information regarding security added thereto for printing, the print control unit adds the information regarding security to the print target information included in the print request and causes the print apparatus to print the print target information to which the information regarding security is added, and if the condition is not satisfied, the print control apparatus stores the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, the print control apparatus causes the print apparatus to print the stored print target information.

2. The print control apparatus according to claim 1, wherein the condition includes a condition that a requester of the print request is a person other than a specific user.

3. The print control apparatus according to claim 1, wherein the condition includes a condition that the print request includes an instruction to the effect that the print target information should have the information regarding security added thereto for printing, and if the condition is not satisfied, the print control unit stores the print target information included in the print request in the storage unit, and when a specific user operates the operation receiving unit provided in the print apparatus to instruct to print the stored print target information, the print control apparatus causes the print apparatus to print the stored print target information.

4. A print apparatus characterized comprising: a print unit that prints on a print medium; an operation receiving unit that receives an user's operation; a print request receiving unit that receives a print request including print target information; and a print control unit, wherein if a condition is satisfied under which print target information should have information regarding security added thereto for printing, the print control unit adds the information regarding security to the print target information included in the print request and causes the print unit to print the print target information to which the information regarding security is added, and if the condition is not satisfied, the print control apparatus stores the print target information included in the print request in a storage unit, and when the operation receiving unit is operated to instruct to print the stored print target information, the print control apparatus causes the print unit to print the stored print target information.

5. A computer-readable medium that stores a program causing a computer to execute a print control process, the print control process comprising: receiving a print request to a print apparatus, the print request including print target information; if a condition is satisfied under which print target information should have information regarding security added thereto for printing, adding the information regarding security to the print target information included in the print request and causing the print apparatus to print the print target information to which the information regarding security is added; and if the condition is not satisfied, storing the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, causing the print apparatus to print the stored print target information.

6. A computer data signal embodied in a carrier wave for enabling a computer to execute a print control process, the print control process comprising: receiving a print request to a print apparatus, the print request including print target information; if a condition is satisfied under which print target information should have information regarding security added thereto for printing, adding the information regarding security to the print target information included in the print request and causing the print apparatus to print the print target information to which the information regarding security is added; and if the condition is not satisfied, storing the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, causing the print apparatus to print the stored print target information.

7. A print control method comprising: receiving a print request to a print apparatus, the print request including print target information; if a condition is satisfied under which print target information should have information regarding security added thereto for printing, adding the information regarding security to the print target information included in the print request and causing the print apparatus to print the print target information to which the information regarding security is added; and if the condition is not satisfied, storing the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, causing the print apparatus to print the stored print target information.
Description



CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application is based on and claims priority under 35 USC 119 from Japanese Patent Application No. 2008-13507 filed Jan. 24, 2008.

BACKGROUND

[0002] 1. Technical Field

[0003] The invention relates to a print control apparatus, a print apparatus, a print control method, a computer-readable medium and a computer-data signal.

[0004] 2. Related Art

[0005] There is known a technology of adding image information regarding security such as a watermark (an electronic watermark) to an original document for printing for the purpose of preventing an unauthorized duplication of a confidential document or tracing a passage route of the confidential document.

[0006] By the way, from the viewpoint of security, it may be undesirable that a printed matter with no information regarding security added thereto is output by a print apparatus and left.

SUMMARY

[0007] According to an aspect of the invention, a print control apparatus includes a print request receiving unit and a print control unit. The print request receiving unit receives a print request to a print apparatus. The print request includes print target information. If a condition is satisfied under which print target information should have information regarding security added thereto for print, the print control unit adds the information regarding security to the print target information included in the print request and causes the print apparatus to print the print target information to which the information regarding security is added. If the condition is not satisfied, the print control apparatus stores the print target information included in the print request in a storage unit, and when an operation receiving unit provided in the print apparatus is operated to instruct to print the stored print target information, the print control apparatus causes the print apparatus to print the stored print target information.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008] Exemplary embodiments of the invention will be described in detail based on the following figures, wherein:

[0009] FIG. 1 is a block view showing one example of the configuration of a print apparatus according to an exemplary embodiment;

[0010] FIG. 2 is a flowchart showing a first example of an operation of the print apparatus according to the exemplary embodiment; and

[0011] FIG. 3 is a flowchart showing a second example of an operation of the print apparatus according to the exemplary embodiment.

DETAILED DESCRIPTION

[0012] Exemplary embodiments of the invention will be described below with reference to the accompanying drawings.

[0013] FIG. 1 is a block view showing one example of the configuration of a print apparatus 1 according to this exemplary embodiment. The print apparatus 1 is an apparatus for receiving a print request and printing based on the print request.

[0014] In FIG. 1, the print apparatus 1 has a print section 10, an operation receiving section 20, a storage section 30, and a control section 40.

[0015] The print section 10 prints on a print medium such as a sheet of paper. For example, the print section 10 is a print engine of an electrophotography system or an ink jet system.

[0016] The operation receiving section 20 receives a user's operation. In specific one exemplary embodiment, the operation receiving section 20 includes a display device for displaying various information, and an input device for receiving various user's operations. For example, the operation receiving section 20 is an operation panel such as a liquid crystal display of a touch panel system.

[0017] The storage section 30 stores print target information. For example, the storage section 30 is a storage device such as a hard disk.

[0018] The control section 40 receives a print request, and controls the print section 10 based on the print request. In one exemplary embodiment, the control section 40 is implemented by cooperation of hardware resources and software. For example, the control section 40 is a computer. Specifically, functions of the control section 40 are implemented in the following manner. That is, a print control program recorded on a recording medium is read into a main memory, and executed by a CPU (Central Processing Unit). The print control program may be provided with recorded on a computer-readable recording medium such as a CD-ROM. Alternatively, the print control program may also be provided through communication as data signals. Also, the control section 40 may be implemented only by hardware.

[0019] The control section 40 includes a print request receiving section 41 and a print control section 42.

[0020] The print request receiving section 41 receives a print request, including print target information, to the print apparatus 1. For example, the print request receiving section 41 receives a print request from a print request output apparatus 2 that is used by a requester of the print request. The print request output apparatus 2 is, for example, a computer, and is connected to the print apparatus 1 via a network such as a LAN (Local Area Network).

[0021] If a condition under which print target information should have information regarding security added thereto for printing is satisfied, the print control section 42 adds the information regarding security to the print target information included in the print request received by the print request receiving section 41, and causes the print section 10 to print the resultant print target information. On the other hand, if the condition is not satisfied, the print control section 42 stores the print target information included in the print request into the storage section 30. Then, when the operation receiving section 20 is operated to instruct to print the stored print target information, the print control section 42 causes the print section 10 to print the stored print target information.

[0022] The information regarding security (which may be hereinafter referred to as "security information") is, for example, information for ensuring security of printed information, information for inhibiting unauthorized duplication or unauthorized use of printed information, information for tracing a source or a leakage route of printed information, or information for protecting the copyright of printed information. Specifically, the security information may include information for specifying an author of printed information (e.g., a name of a document author), information for specifying a person who has printed (e.g., a name of a print requester), a name of printed information (e.g., a document name), date and time of printing, information for specifying the print request output apparatus 2 which has transmitted the print request (e.g., IP address), information for specifying the print apparatus 1 (e.g., IP address), characters such as "copy prohibited", a company mark, and/or information (e.g., serial number) for specifying a printed matter.

[0023] The security information may be information included in the print request (e.g., the IP address of the print request output apparatus 2, the name of the print requester, and/or the name of document), or information previously registered in the print apparatus 1 (e.g., the IP address of the print apparatus 1, predetermined letters and marks). Alternatively, the security information may be information generated by the print apparatus 1 (e.g., printing date and time and/or serial number).

[0024] In one exemplary embodiment, the security information is added to the print target information as a watermark (an electronic watermark). However, in another exemplary embodiment, the security information may be added to the print target information in a form other than the electronic watermark. For example, the security information may be added as a machine readable code such as a bar code, or as a header or a footer. Alternatively, the security information may be added as a combination of a watermark and a machine readable code. For example, by using the technology described in JP 2001-346032 A, the security information may be added as copy forgery preventing image data including a machine readable code provided in any one of a latent image part and a background part. In the exemplary embodiment in which the security information is added as a machine readable code, the machine readable code may be information for control of an apparatus of a copier or the like, such as prohibition of the copying operation of a copier.

[0025] From the viewpoint of favorably preventing unauthorized copying, in one exemplary embodiment, the security information is embedded in the entire surface of a print medium. For example, the security information is embedded as a watermark in the entire surface of a print medium. However, the security information may be placed in a partial region of the print medium.

[0026] From the viewpoint of preventing a user, who is not authorized to produce an output without adding security information, outputting print target information without adding security information, in one exemplary embodiment, the condition is that the requester of the print request is a person other than a specific user. In this exemplary embodiment, if the requester of the print request is not the specific user, the print control section 42 adds the security information to the print target information for printing. If the requester is the specific user, the print control section 42 stores the print target information, and causes the print target information to be printed when a print instruction is made. In this case, the print control section 42 receives, for example, user identification information for identifying the requester from the requester or the print request output apparatus 2. Then, the print control section 42 judges as to whether or not the user identification information has been previously registered in a storage section. If the user identification information has been registered, the print control section 42 judges that the requester is the specific user. When the requester is not registered, the print control section 42 judges that the requester is not the specific user. The specific user is, for example, a user who is authorized to produce an output without adding the security information thereto. The specific user is set by, for example, the administrator of the print apparatus 1.

[0027] However, the condition may be a condition other than the above one. For example, the condition may be a condition that the print request includes an instruction to the effect that the print target information should have the information regarding security added thereto for printing. In this case, from the viewpoint of preventing a user, who is not authorized to produce an output without adding security information, from producing an output without adding security information, in one exemplary embodiment, if the condition is not satisfied (namely, if the print request does not include such an instruction), the print control section 42 stores the print target information included in the print request into the storage section 30. Then, when the operation receiving section 20 is operated to instruct to print the stored print target information by the specific user, the print control section 42 causes the print section 10 to print the stored print target information. In this case, the print control section 42 receives, for example, user identification information for identifying the user from an operator of the operation receiving section 20 via the operation receiving section 20 or the like. Then, the print control section 42 judges as to whether or not the user identification information has been previously registered in the storage section. If the user identification information has been registered, the print control section 42 judges that the operator is the specific user. If the operator is not registered, the print control section 42 judges that the operator is not the specific user. The specific user is, for example, a user who is authorized to produce an output without adding security information thereto. The specific user is set by, for example, the administrator of the print apparatus 1. Incidentally, if the operator is not the specific user, the print control section 42, for example, does not print the print target information, or forcibly adds security information to the print target information for printing.

[0028] In one exemplary embodiment, the print control section 42 has, as its operation modes, (i) a forcible addition mode for forcibly adding security information to all print target information and (ii) a forcible addition cancel mode for not forcibly adding security information. When the system is set in the forcible addition mode and when the print control section 42 receives a print request including print target information, the print control section 42 adds security information to the print target information, and causes the print section 10 to print the resultant print target information. On the other hand, when the system is set in the forcible addition cancel mode, namely, when the forcible addition setting is released, the print control section 42 performs the above described control from the viewpoint of preventing a printed matter with no security information added thereto from being printed by the print apparatus 1 and from being left. Namely, if the condition is satisfied, the print control section 42 adds security information to the print target information for printing. Otherwise, the print control section 42 stores the print target information. Then, when an operation of instructing printing is performed, the print control section 42 causes the print target information to be printed. The forcible addition mode and the forcible addition cancel mode are switched by, for example, the administrator of the print apparatus 1. In one use example, the print apparatus 1 is generally set in the forcible addition mode. When there arises necessity of performing printing without adding security information, the mode is switched to the forcible addition cancel mode. The switching is performed by, for example, the administrator or a user authorized by the administrator via the operation receiving section 20 of the print apparatus 1 or an information processing apparatus connected to the print apparatus 1.

[0029] In the example of FIG. 1, the storage section 30 is provided in the print apparatus 1. However, the storage section 30 may also be provided outside the print apparatus 1.

[0030] Also, in the example of FIG. 1, the control section 40 is provided in the print apparatus 1. However, the control section 40 may be provided outside the print apparatus 1. For example, the control section 40 may be implemented by a print server connected to the print apparatus 1. Also, the control section 40 may be implemented physically by one device or may be implemented physically by plural devices.

[0031] FIG. 2 is a flowchart showing a first example of the operation of the print apparatus 1 according to this exemplary embodiment. With reference to FIG. 2, the first example of the operation of the print apparatus 1 will be described below.

[0032] The control section 40 receives a print request from a requester including document data which is an example of the print target information (S11). Specifically, the control section 40 receives the print request from the print request output apparatus 2.

[0033] Then, the control section 40 judges as to whether or not the requester of the print request is the specific user (S12). For example, the control section 40 receives authentication information for authenticating the requester from the print request output apparatus 2. Then, the control section 40 authenticates the requestor using the authentication information, and judges as to whether or not the authenticated user is a specific user set in advance. The control section 40 may extract authentication information from the print request. Alternatively, the control section 40 may receive authentication information by inquiring of the requester after receiving the print request.

[0034] When the control section 40 judges that the requester is not the specific user (S12: NO), the control section 40 adds a watermark, which is an example of the security information, to the document data included in the print request to generate document data with a watermark added thereto, and causes the print section 10 to print the document data with the watermark added thereto (S13).

[0035] On the other hand, if the control section 40 judges that the requester is the specific user (S12: YES), the control section 40 stores the document data included in the print request into the storage section 30 (S14).

[0036] Then, the control section 40 waits until it receives a instruction of printing the stored document data from a user via the operation receiving section 20 (S15: NO). Upon receiving the print instruction (S15: YES), the control section 40 causes the print section 10 to print the document data stored in the storage section 30 (S16). In this case, the control section 40 does not forcibly add a watermark to the document data. For example, when an instruction to the effect that a watermark should be added is not included in the print request, the control section 40 causes the document data to be printed with no watermark added thereto. When an instruction to the effect that a watermark should be added is included in the print request, the control section 40 causes the document data to be printed with a watermark added thereto.

[0037] As described above, when the requester is a person other than the specific user, after receiving of the print request, a watermark is forcibly added to the document data. Immediately thereafter, the document data is printed out.

[0038] On the other hand, when the requester is the specific user, after receiving of the print request, the document data is stored. Then, the user performs a print instruction operation for the operation receiving section 20, so that the document data is printed out. For example, after the document data is stored, the requester comes in front of the print apparatus 1, and performs the print instruction operation. Then, the document data is printed.

[0039] FIG. 3 is a flowchart showing a second example of the operation of the print apparatus 1 according to this exemplary embodiment. With reference to FIG. 3, the second example of the operation of the print apparatus 1 will be described below.

[0040] The control section 40 receives a print request, from a requester, including document data which is an example of print target information (S21). Specifically, the control section 40 receives the print request from the print request output apparatus 2.

[0041] Then, the control section 40 judges as to whether or not the print request includes an instruction to the effect that a watermark should be added (S22).

[0042] When the control section 40 judges that the print request includes the instruction to the effect that a watermark should be added (S22: YES), the control section 40 adds a watermark, which is an example of the security information, to the document data included in the print request to generate document data with a watermark added thereto, and causes the print section 10 to print out the document data with the watermark added thereto (S23).

[0043] On the other hand, when the control section 40 judges that the print request does not include an instruction to the effect that a watermark should be added (S22: NO), the control section 40 stores the document data included in the print request into the storage section 30 (S24).

[0044] Then, the control section 40 waits until it receives an instruction of printing the stored document data from a user via the operation receiving section 20 (S25: NO). Upon receiving the print instruction (S25: YES), the control section 40 judges as to whether or not the operator of the print instruction is the specific user (S26). For example, the control section 40 receives authentication information from the operator via the operation receiving section 20 or the like. Then, the control section 40 authenticates the operator using the authentication information, and judges as to whether or not the authenticated user is the previously set specific user.

[0045] When the control section 40 judges that the operator is the specific user (S26: YES), the control section 40 causes the print section 10 to print the document data stored in the storage section 30 (S27). In this case, the document data is output with no watermark added thereto.

[0046] On the other hand, when the control section judges that the operator is not the specific user (S26: NO), the control section 40 does not print the stored document data, but shows to the operator information indicating that the document data is unprintable (S28). In this case, the control section 40 may cause the print section 10 to print the document data with a watermark added thereto, in place of showing to the operator the information indicating that the document data is unprintable

[0047] As described above, when the print request includes an instruction to the effect that a watermark should be added, after receiving of the print request, a watermark is added to the document data. Immediately thereafter, the document data is printed out.

[0048] On the other hand, when the print request does not include an instruction to the effect that a watermark should be added, after receiving of the print request, the document data is stored. Then, the specific user performs a print instruction operation for the operation receiving section 20, so that the document data is printed out. For example, after the document data is stored, the requester comes in front of the print apparatus 1, and performs the print instruction operation. Then, after the requester is confirmed to be a specific user, the document data is printed.

[0049] In the example of FIG. 3, upon receiving the print instruction, the control section 40 judges as to whether or not the operator is the specific user. However, upon receiving the print instruction, the control section 40 may cause the print section 10 to print the document data stored in the storage section 30. Namely, in FIG. 3, an arrow of YES of the step S25 may be connected to the step S27. In this case, the steps S26 and S28 are omitted.

[0050] It should be noted that the invention is not limited to the exemplary embodiments, and various modifications may be made within the scope not departing from the gist of the invention.

* * * * *


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed